No more applications are being accepted for this job
- Manage and conduct hands-on technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team
- Guide and mentor peers and subordinates to provide cross training
- Ensure accountability and punctuality of security analysts assigned to your shift
- Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly)
- Articulate daily challenges to the Government Watch Officer (GWO)
- Analyze web and host logs for indications of compromise
- Remediate and coordinate the remediation of infected or compromised devices
- Ensure shift continuity during call-outs and emergencies
- Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events
- Document and update processes, workflows, and technical guides
- Active/current TS/SCI clearance required to be considered
- US Citizenship required
- Extensive knowledge of a SOC's/NOSC's purpose and role within an organization
- Detailed understanding of common network ports and protocols (e.g
- Expertise with network topologies and network security device functions (e.g
- Expertise with packet analysis tools such as
Cyber Network Defense Analyst with Security Clearance - Ashburn, VA, United States - Leidos
Description
R Description Leidos is seeking a Cyber Network Defense Analyst (CNDA) to join our team on a highly visible cyber security single-award IDIQ vehicle that provides Network Operations Security Center (NOSC) support, cyber analysis, application development, and a 24x7x365 support staff.
The Network Operations Security Center (NOSC) is a U.SGovernment program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the e nterprise.
The NOSC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOCDirection and coordination are achieved through a shared customer incident tracking system and other means of coordination and communication
The Monitoring and Analysis team provide 24x7 support across 4 different shifts
We have front half shifts (day and night) and back half shifts (day and night)
The front half shift will work 12-hour shifts from Sunday – Tuesday and alternating Wednesdays
The back half shift will work 12-hour shifts from Thursday – Saturday and alternating Wednesdays
Candidates must have the ability to work non-core hours, if necessary
Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs)
Primary Responsibilities:
Basic Qualifications:
Candidates should also demonstrate the following: Bachelor's Degree and 2-4 years of SOC analyst experience
Additional experience may be considered in lieu of a degree
Wireshark Original Posting Date:
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above
Pay Range:
Pay Range $65, $117,500.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.